You are here

IT Security from Kassel in Hessen

Our local security office is located in Kassel, Hessen - Germany. The Evolution Security GmbH pentest- & apt core research -team is a trusted source for big companies, instituts or the industry. We grant secrecy, privacy, reliability & confidentiality to all of our clients & partners. Our services are offered from germany to the public european industry & different international parties.

24/7h Availability of our Services

The Evolution Security GmbH team is 24/7h available for customers, members and of course to important clients. The administration is available as first representative of the security company and the first instance to customers or clients. Contact our representatives only with a special reason, for security job offers, an invitation to conference/event, important customer and client requests.Feel free to read the service documents via rss xml feed or contact us.

Contact the Evolution Security Company

This website is a project of the "Evolution-Security GmbH" and was founded in 1997 in Europe. The official security company has been registered in 2008 and became a GmbH in 2014. Questions about the content, pentest offers, press, commercials or partnerships? Feel free to contact our cooperative company support team to find a solution or to receive an answer. Questions regarding articles, advisories or upcoming vulnerabilities to the core research team.

Blackbox Penetration Testing

Blackbox - Penetration Testing

Blackbox penetration test requires no prior information about the target network or application and is actually performed keeping it as a real world hacker attack scenerio. Even though, most of the times the testing team could have access to the application source code and or the other network elements, black box testing is still preferred because it not only catches all the low hanging fruit, but also enables the security experts to look at various other levels of security including the server level vulnerabilities.

This is usually the best approach because it enables our security team to think out of the box and perform tests on all levels and according to our practical expertise and knowledge. Our security experts will use all of the tricks and methodologies at their disposal in an effort to emulate the persistence, knowledge and expertise level of potential attackers.

In this process the hacker will be only provided with the company’s website or IP address. Therefore the ethical hacker simulates all web hacking techniques (e.g. Social Engineering, Network Scanning, remote access exploitation etc.) that would be used in a real life attempt to breach security.

The end goal is to verify the integrity of our client’s network and applications and to proactively reduce risks that pose a direct threat from an insider / outsider hacker or other adversaries.